3Com 3C16670 - LinkBuilder FMS II Hub Configuration Manual page 7

Configuration guide
Table of Contents

Advertisement

Expansion modules connect
directly to the LinkBuilder MSH
coax or fiber Ethernet modules.
These expansion modules reduce
connectivity costs and easily
accommodate diverse cabling
requirements. Similarly, the 7-port
UTP module features six RJ-45
ports and a transceiver interface
port for connection to the backbone.
Small Satellite Office
Highlights
The smaller satellite office is not
expected to grow, but users need to
share data and access resources at
the central site. With its built-in
SmartAgent intelligence and optional
local bridging, the 8-port LinkBuilder
TP/8i fixed-port hub is a robust,
affordable solution.
Products
LinkBuilder MSH Chassis with FDDI
Backplane (3C18041)
LinkBuilder MSH 525W Power Supply Unit
(3C18012)
LinkBuilder MSH 24-Port 10BASE-T
Repeater Module (3C18122A)
LinkBuilder MSH 13-Port 10BASE-T
Repeater Module (3C18120A)
LinkBuilder MSH 7-Port 10BASE-T
Repeater Module (3C18124A)
LinkBuilder MSH Management Module
(3C18500)
LinkBuilder MSH Transceiver Interface
Expansion Module (3C18146)
Fiber-Optic Transceiver Interface Module
(3C1206-5)
NETBuilder II Bridge/Router 4-Slot Chassis
(3C6000)
Fiber-Optic Repeater Module (3C18135A)
LinkBuilder
3C16181
TP/8i
STATUS
STATUS
green = link OK
green = link OK
Red
= Partition
Red
= Partition
off
= link fail
off
= link fail
MDI
Red = Partition
Packet
Power
MDIX
1
2
3
4
1
2
3
4
TCVR
Collision
MGMT
Products
LinkBuilder TP/8i Hub (3C16181)
NETBuilder Remote Office 201 (3C8201)
Security: Defending
Data and Resources
The LinkBuilder FMS II hubs and the
Ethernet modules in the LinkBuilder MSH
support 3Com's LAN Security Architecture
(LSA), making them highly effective tools
for safeguarding valuable data and com-
puting resources. A patented, chip-based
system, LSA provides the following power-
ful security features:
• Need to Know protects sensitive data
on the network by checking destination
addresses on each packet and sending
readable packets only to authorized
nodes.
• Disconnect Unauthorized Device auto-
matically records and/or disables an
unauthorized device attempting to log
on to the network.
• Audit Log gives the manager a
complete record of user and device
changes on the network.
• Multiple User Levels ensure that only
authorized users have access to
critical network functions.
• Passwords can be used to identify
network managers.
Stand-alone encryption systems that pro-
vide the same protection are expensive
and relatively difficult to implement, and
can adversely affect network performance.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Linkbuilder fms ii hub

Table of Contents